Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lookahead networks., , and . AFIPS National Computer Conference, volume 51 of AFIPS Conference Proceedings, page 153-165. AFIPS Press, (1982)Correctness and access time properties of an extended token ring protocol., and . ICCC, page 402-407. International Council for Computer Communication / Elsevier, (1988)Reconfigurable Hierarchical Rings., and . RTSS, page 3-10. IEEE Computer Society, (1980)Fast simulation of dependability models with general failure, repair and maintenance processes., , , and . FTCS, page 491-498. IEEE Computer Society, (1990)Modeling and Analysis of System Dependability Using the System Availability Estimator., , , , , and . FTCS, page 137-141. IEEE Computer Society, (1994)An Efficient Scheme for Providing High Availability., , , and . SIGMOD Conference, page 236-245. ACM Press, (1992)SIGMOD Record 21(2), June 1992.An Intelligent Page Store for Concurrent Transaction and Query Processing., , and . RIDE-TQP, page 12-19. IEEE Computer Society, (1992)Modeling and Analysis of Computer System Availability., and . Computer Performance and Reliability, page 399-400. North-Holland, (1987)Evaluation of Performability for Degradable Computer Systems., and . IEEE Trans. Computers, 36 (6): 738-744 (1987)Measure specific dynamic importance sampling for availability simulations., , and . WSC, page 351-357. ACM, (1987)